Module 3 - Attacking the Foundation Flashcards

(86 cards)

1
Q

Which protocol operates at Layer 3 (Network layer) , is connectionless, and delivers packets between hosts without tracking their flow?

A

IP (Internet Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Layer 4( Transport) protocol is typically responsible for managing the flow of packets, since IP does not handle it?

A

TCP (Transmission Control Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which field in the IPv4 header contains the value 0100 in binary to indicate that the packet is IPv4?

A

The Version Field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is known as the technical “envelope” that wraps each data package sent over the internet?

A

A Packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which part of a packet contains control information (like addresses, routing rules)?

A

The Packet Header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which part of the packet contains the actual data being sent (like a web request, video, or file)?

A

The Packet Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which IPv4 header field is used to detect transmission errors by checking the contents of the IP header?

A

Header Checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which IPv4 header 2 bits of the DiffServ field are used to signal congestion without dropping packets?

A

ECN (Explicit Congestion Notification) bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do we call the IPv4 part of a packet that focuses just on the delivery instructions (how it moves across networks)?

A

An IPv4 Packet Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which 4-bit IPv4 header field specifies the length of the header and has a minimum value of 20 bytes?

A

The Internet Header Length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which IPv4 header field was formerly called the Type of Service (ToS) and is now used to determine packet priority?

A

Differentiated Services field (Diffserv)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the six most significant bits of the DiffServ field called, used to classify and prioritize packets in IPv4 headers?

A

DSCP (Differentiated Services Code Point)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the maximum possible size of an IPv4 packet as determined by the Total Length field?

A

65 535 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which three IPv4 header fields are used to support packet fragmentation and reassembly across networks?

A

Identification, Flags and fragment offset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens when the TTL field of an IPv4 packet reaches zero during transit?

A

The packet is discarded and a ICMP time exceeded message is sent to the source IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which IPv4 field is used to prevent infinite loops by reducing its value each time a router forwards the packet?

A

TTL (Time-to-live)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which field in the IPv4 header indicates the complete length of the IP packet, including header and user data?

A

Total length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of address is always found in the Source IPv4 Address field of a packet?

A

A unicast address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which IPv4 header field contains the 32-bit binary address of the device that originally sent the packet?

A

Source IPv4 Address field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which field in the IPv4 header identifies the protocol used in the data payload, such as TCP or UDP?

A

The Protocol field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which values are commonly found in the Protocol field for ICMP, TCP, and UDP?

A

ICMP = 1, TCP = 6, UDP= 18

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which IPv4 header field contains the 32-bit binary value representing the final destination of the packet?

A

The destination IPv4 address field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of the Options and Padding field in the IPv4 header?

A

To support optional settings and to ensure the field is a multiple of 32 bits by adding padding if necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which vulnerability allows a threat actor to send a packet that appears to originate from a fake source address?

A

IP spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Which type of exploit involves manipulating header fields to split packets into smaller fragments?
Fragmentation attack
3
Which IPv4 header field is reduced by each router to limit how long a packet can circulate in the network?
TTL (Time-to-live)
3
Which header field in an IPv6 packet contains the binary value 0110 to identify the protocol version?
Version
3
Which layer of the OSI model is responsible for passing packets to IP for routing?
Layer 3 (Network layer)
3
Which 8-bit IPv6 field serves the same function as the IPv4 Differentiated Services (DS) field?
The Traffic Class field
4
Which field in the IPv6 header indicates the length of the data portion, excluding the header itself?
Payload length
4
Which 8-bit IPv6 field identifies the type of data being carried and is functionally equivalent to the IPv4 Protocol field?
The Next Header Field
4
Which IPv6 header field replaces the IPv4 TTL field and is decremented by each forwarding router?
The Hop Limit field
4
Which 128-bit field in an IPv6 packet contains the address of the device that originated the packet?
IPv6 Source IP address
4
What is the purpose of extension headers in IPv6?
EH (Extension Headers) provide optional network layer information
4
Which field in the IPv6 header contains the 128-bit address of the intended receiving device?
IPv6 Destination IP Address
4
Which IPv6 feature is used to support tasks like fragmentation, security, and mobility, but is not required in every packet?
An EH (Extension Header)
4
How do IPv6 routers handle packet fragmentation during transit?
They do not handle fragmentation, it must be handles by the source host
5
Which attack uses multiple coordinated systems to flood a target and deny service access?
A (DDoS) Distributed Denial of Service Attack
5
Which attack involves overwhelming a system to prevent legitimate users from accessing services or data?
A DoS (Denial of Service) Attack
5
Which field in IPv6 determines how routers classify and prioritize traffic flows, especially for real-time services?
The flow label Field
5
Which type of attack uses ICMP echo packets to map networks, flood targets, or manipulate routing tables?
ICMP attacks
5
Which attack involves intercepting communication between two systems to capture or manipulate data in transit?
A MiTM (Man in the middle) attack
6
Which type of IP-based attack involves forging the source address to disguise identity and perform blind or non-blind spoofing?
Address Spoofing Attack
6
Which attack starts with physical access to a network and escalates by taking over an active session through packet interception?
A Session hijacking Attack
7
Which type of attack uses ICMP to gather information about network topology, host availability, OS types, and firewall status?
Reconnaissance and scanning attacks
7
Which protocol was developed to carry diagnostic messages and report network errors, such as unreachable routes or hosts?
ICMP (Internet Control Message Protocol)
7
Which ICMP message type is used by the ping command to verify connectivity with a destination?
An ICMP echo request
8
Which ICMP message type is exploited to perform host verification and flood targets in DoS attacks?
ICMP echo request and reply
8
Which ICMP message type helps threat actors map out internal IP address structures?
ICMP mask reply
9
Which ICMP message type can be used to manipulate host routing decisions and redirect traffic through a compromised device?
ICMP redirects
9
Which ICMP message type is used by threat actors for scanning networks and identifying inaccessible systems or services?
ICMP unreachable
10
What activity can ICMP-based reconnaissance reveal about the targeted host, besides its presence on the network?
The hosts operating system via OS fingerprinting
11
Which ICMP message type allows attackers to inject fake routes into a host’s routing table during a reconnaissance attempt?
ICMP router discovery
12
Which type of DoS attack technique involves sending ICMP echo requests to many hosts using the victim’s IP address as the source?
Amplification attack
13
Which type of attack focuses on consuming a target host’s or network’s resources until it crashes or becomes unusable?
Resource exhaustion attack
13
Which DoS technique involves having many hosts respond to a spoofed IP address, causing the victim to be overwhelmed with replies?
Reflection attack
14
In which spoofing type does the threat actor have visibility into the traffic between host and target, allowing for session hijacking and firewall probing?
Non-blind spoofing
15
Which type of spoofing is used when the attacker cannot view return traffic from the target, commonly for DoS attacks?
Blind spoofing
16
Which TCP flag is used to abruptly terminate an existing connection between two hosts?
RST
16
Which TCP control flag indicates that the urgent pointer field is significant and the data should be prioritized?
URG
17
Which TCP control bit is used to signify that the acknowledgment field contains a valid response?
ACK
18
Which TCP control flag instructs the receiver to push the buffered data to the application immediately?
PSH
19
Which TCP control flag is used to begin establishing a TCP connection by synchronizing sequence numbers?
SYN
20
Which TCP control bit indicates that the sender has finished transmitting data?
FIN
21
What is the 1-bit field used to control the state and behavior of a TCP connection?
A flag/ control bit
22
Which TCP service ensures that data segments are retransmitted if no acknowledgment is received in time?
Reliable delivery
23
Which TCP service allows multiple segments to be acknowledged at once, rather than requiring a response for each one?
Flow control
24
Which TCP service involves tracking connection state between two endpoints using a three-way handshake?
Stateful communication
25
Which TCP process must occur before data transmission and involves exchanging three control messages?
A TCP three way handshake
26
What is the first step of the TCP three-way handshake?
The initiating client requests a client to server communication session.
27
What is the second step of the TCP three-way handshake?
The server acknowledges the session and requests a server to client communication session
27
What is the third step of the TCP three-way handshake?
The client acknowledges the server to client communication session
28
Which type of attack floods a target with SYN packets using spoofed IP addresses to consume server resources with half-open connections?
A TCP SYN flood attack
29
In a TCP SYN Flood attack, which part of the three-way handshake does the attacker never send?
An ACK message to the servers SYN-ACK message
30
In a TCP SYN Flood, why can legitimate users not access the web server?
The server becomes overwhelmed with half open TCP connections
31
During a TCP SYN Flood, how does the target server initially respond to each spoofed SYN request?
With a SYN-ACK packet
32
Which type of TCP-based attack abruptly terminates an active TCP session using a spoofed packet?
A TCP reset attack
33
Which attack involves a threat actor taking over an authenticated TCP session by predicting the next sequence number and spoofing an IP address?
TCP session hijacking
33
In TCP session hijacking, what key detail must a threat actor accurately predict to succeed?
The next TCP sequence number
34
Why can a threat actor who hijacks a TCP session only send but not receive data?
They spoof the source IP address and replies go to the legitimate host
35
Which layer 4 protocol is connectionless and used by DNS, DHCP, TFTP, NFS, SNMP, and real-time applications like VoIP?
UDP (User Datagram Protocol)
36
What term is commonly used to describe UDP data units, even though the protocol technically uses datagrams?
Segments
37
Why is UDP preferred for simple request-reply protocols like DHCP?
It avoids overhead of TCP and redirects unnecessary traffic
38
Which type of DoS-style attack sends a high volume of UDP packets to overwhelm a network or host?
UDP flood attack
38
What tools are commonly used to launch UDP flood attacks?
UDP Unicorn and Low orbit ion cannon
39
How is optional network layer information carried by IPv6 packets?
Inside an EH (Extension Header) attached to the main IPv6 header.